diff options
author | simon <simon@FreeBSD.org> | 2005-08-28 02:17:24 +0800 |
---|---|---|
committer | simon <simon@FreeBSD.org> | 2005-08-28 02:17:24 +0800 |
commit | 50cb2c692d970899c8a46e699920a5f1a6629e4b (patch) | |
tree | 9e8cef717199e9fef384719d7b74996c3e26f42d /security/vuxml | |
parent | 3b09744514c72ea3595745498d3dce7c76569058 (diff) | |
download | freebsd-ports-gnome-50cb2c692d970899c8a46e699920a5f1a6629e4b.tar.gz freebsd-ports-gnome-50cb2c692d970899c8a46e699920a5f1a6629e4b.tar.zst freebsd-ports-gnome-50cb2c692d970899c8a46e699920a5f1a6629e4b.zip |
Mark phpgroupware as vulnerable to pear-XML_RPC -- remote PHP code
injection vulnerability.
Reported by: olgeni
Approved by: portmgr (blanket, VuXML)
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 7 |
1 files changed, 6 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 96fb5e3f4ca4..0006b80eb071 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -314,6 +314,10 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <name>phpAdsNew</name> <range><lt>2.0.5</lt></range> </package> + <package> + <name>phpgroupware</name> + <range><lt>0.9.16.007</lt></range> + </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> @@ -338,6 +342,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </description> <references> <cvename>CAN-2005-2498</cvename> + <url>http://downloads.phpgroupware.org/changelog</url> <url>http://drupal.org/files/sa-2005-004/advisory.txt</url> <url>http://phpadsnew.com/two/nucleus/index.php?itemid=45</url> <url>http://sourceforge.net/project/shownotes.php?release_id=349626</url> @@ -348,7 +353,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <dates> <discovery>2005-08-15</discovery> <entry>2005-08-15</entry> - <modified>2005-08-17</modified> + <modified>2005-08-27</modified> </dates> </vuln> |